Introduction This post will be an attempt at visualizing some of the strategies used by attackers...
(Last edit: 2023-01-30 21:00, first version 2022-11-03 18:12) Summary of WhiteRabbit attack Ma...
Finally back to a classic FRA challenge. This one turned out to be more of a programming/engineering...
Updated: 2022-10-23. (I first wrote the intro back in 2020 when this was active but I didn't want to...
As I was "casually" surfing the web I stumbled upon some PHP files with random names. It turns out t...
This is just a short story of how I set up a honeypot and waited 10 months for a single request. And...
Intro This year our friends at FRA did something new and hosted a sort of Christmas crafts compet...
I just wanted to share some updates here on my website! :) New real security challenges I've s...
For more than 3 years "The famous HASH game" has been unavailable but now I'm happy to announce that...
You're out surfing the world wide web having a great time, then suddenly, you find a security vuln...
In this post we continue on the topic of FRA challenges. This challengemirror is quite different f...
It's the end of the year and a nice time to look at the security challenges posed by our Swedish S...
Greed is good, or is it? Cue the Vsauce intro. Have you ever thought, "How does the Internet w...
You have probably heard about backdoors in different software, the dlink user-agent backdoor[1] ...
Checksums and hashes are great for detecting errors and modifications of data, but what if your data...
Most apps on your phone can interact with the Internet. By analysing the details of these interactio...
Why is no one using anonymous comments anymore? Either you have to register for yet another site or ...
A few weeks ago my girlfriend showed me that the gym she goes to had started to upload instruct...
Introduction If you've played the modern Fallout series you have without a doubt also tried to hack...